Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it. The prefix “crypt-” means “hidden” or “vault” — and the suffix “-graphy” stands for “writing.” This short course will run you through the a few of most important cryptographic protocols.
This course will not make you a security expert but it is the first step towards the same.
Learning the inner working of the techniques and the mathematics is what this course focusses on.
Cryptographic algorithms are used for important tasks such as data encryption, authentication, and digital signatures, but one problem has to be solved to enable these algorithms: binding cryptographic keys to machine or user identities. Public key infrastructure (PKI) systems are built to bridge useful identities (email addresses, Domain Name System addresses, etc.) and the cryptographic keys used to authenticate or encrypt data passing among these identities.
Cryptography is everywhere.
It has become an integrated layer of defense within all of the digital transformation initiatives now collectively referred to as digital business. As the foundation of modern security systems, cryptography is used to secure transactions and communications, safeguard personal identifiable information (PII) and other confidential data, authenticate identity, prevent document tampering, and establish trust between servers. Cryptography is one of the most important tools businesses use to secure the systems that hold its most important asset β data β whether it is at-rest or in-motion. Data is vital information in the form of customer PII, employee PII, intellectual property, business plans, and any other confidential information. Therefore, cryptography is critical infrastructure because increasingly the security of sensitive data relies on cryptographical solutions.
Weak or hidden crypto can expose critical infrastructure to vulnerabilities. Public attention to exposed data leads to brand erosion. This modern environment requires organizations to pay attention to how cryptography is being implemented and managed throughout the enterprise.
When wrapped within the invisible layers that form cryptography, sensitive data becomes unreadable and unmodifiable, preventing bad actors from carrying out nefarious activity.